https://bugs.kde.org/show_bug.cgi?id=369175
--- Comment #18 from Mark Wielaard <m...@redhat.com> --- Never mind the objdump -h gives the right information. The 0x3824B2B0 is indeed in the middle of the ODP. The ODP is loaded and DATA (not CODE), which I assume means it is readable (so we can load/read the actual function address and jump to that) but not execute it. -- You are receiving this mail because: You are watching all bug changes.